✕ Clear filters
670 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,250📚 Coursera 18,118🎤 TED 1
SANS Institute - Self Paced Online Training
🔐 Cybersecurity
SANS Institute - Self Paced Online Training
SANS Institute Advanced 5y ago
ZOMG It's ZOOM! - Don't worry, it's safe.  As long as you follow some rules. - SANS Webcast
🔐 Cybersecurity
ZOMG It's ZOOM! - Don't worry, it's safe. As long as you follow some rules. - SANS Webcast
SANS Institute Beginner 5y ago
Are You Certifiable? | SANS@MIC Talk
🔐 Cybersecurity
Are You Certifiable? | SANS@MIC Talk
SANS Institute Intermediate 5y ago
The Hackers Apprentice | SANS@MIC Talk
🔐 Cybersecurity
The Hackers Apprentice | SANS@MIC Talk
SANS Institute Advanced 6y ago
Stealth persistence strategies | SANS@MIC Talk
🔐 Cybersecurity
Stealth persistence strategies | SANS@MIC Talk
SANS Institute Intermediate 6y ago
Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime
🔐 Cybersecurity
Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime
SANS Institute Intermediate 6y ago
xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast
🔐 Cybersecurity
xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast
SANS Institute Advanced 6y ago
Real-Time OSINT: Investigating Events as They Happen | SANS OSINT Summit 2020
🔐 Cybersecurity
Real-Time OSINT: Investigating Events as They Happen | SANS OSINT Summit 2020
SANS Institute Beginner 6y ago
Understanding SANS CyberCast - So Much More Than Live Virtual Training
🔐 Cybersecurity
Understanding SANS CyberCast - So Much More Than Live Virtual Training
SANS Institute Intermediate 6y ago
OUTMANEUVER: Changing the Attack Surface
🔐 Cybersecurity
OUTMANEUVER: Changing the Attack Surface
SANS Institute Intermediate 6y ago
OUTPERFORM: Strategies to Get in Front of Attacks
🔐 Cybersecurity
OUTPERFORM: Strategies to Get in Front of Attacks
SANS Institute Intermediate 6y ago
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
🔐 Cybersecurity
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
SANS Institute Intermediate 6y ago
This Will Never Work: Tales from Disappointingly Successful Pen Tests | SANS SOC Summit 2019
🔐 Cybersecurity
This Will Never Work: Tales from Disappointingly Successful Pen Tests | SANS SOC Summit 2019
SANS Institute Beginner 6y ago
Rapid Recognition and Response to Rogues | SANS Security Operations Summit 2019
🔐 Cybersecurity
Rapid Recognition and Response to Rogues | SANS Security Operations Summit 2019
SANS Institute Beginner 6y ago
Cyber Threats to Electric Industry - What You Need to Know | STAR Webcast
🔐 Cybersecurity
Cyber Threats to Electric Industry - What You Need to Know | STAR Webcast
SANS Institute Advanced 6y ago
Build Effective Cybersecurity Team Skills | SANS Team-Based Training
🔐 Cybersecurity
Build Effective Cybersecurity Team Skills | SANS Team-Based Training
SANS Institute Advanced 6y ago
The State of Cloud Security: How Does Your Organization Compare? | SANS Cloud Security Summit 2019
🔐 Cybersecurity
The State of Cloud Security: How Does Your Organization Compare? | SANS Cloud Security Summit 2019
SANS Institute Intermediate 6y ago
SANS Institute & Trace Labs partner on an OSINT Missing Persons CTF challenge at SANS CDI 2019
🔐 Cybersecurity
SANS Institute & Trace Labs partner on an OSINT Missing Persons CTF challenge at SANS CDI 2019
SANS Institute Intermediate 6y ago
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
🔐 Cybersecurity
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
SANS Institute Advanced 6y ago
Introducing Core NetWars Continuous 2
🔐 Cybersecurity
Introducing Core NetWars Continuous 2
SANS Institute Beginner 6y ago
Not giving credit where credit is due - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Not giving credit where credit is due - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Including details most readers don't need - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Including details most readers don't need - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Escalating tensions in difficult situations - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Escalating tensions in difficult situations - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using FUD to cause anxiety - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Using FUD to cause anxiety - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Not using parallel structure - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Not using parallel structure - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using more words than necessary - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Using more words than necessary - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Applying Inconsistent formatting - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Applying Inconsistent formatting - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Including indecipherable graphics - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Including indecipherable graphics - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Burying the Main Point - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Burying the Main Point - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
John Hubbard - How were you introduced to SANS?
🔐 Cybersecurity
John Hubbard - How were you introduced to SANS?
SANS Institute Beginner 6y ago
John Hubbard -If you’ve completed a 500-level course should you still give thought to taking SEC450?
🔐 Cybersecurity
John Hubbard -If you’ve completed a 500-level course should you still give thought to taking SEC450?
SANS Institute Beginner 6y ago
John Hubbard - How to determine whether SEC401 or SEC450 is best?
🔐 Cybersecurity
John Hubbard - How to determine whether SEC401 or SEC450 is best?
SANS Institute Beginner 6y ago
John Hubbard - Will SEC 450 carry a certification?
🔐 Cybersecurity
John Hubbard - Will SEC 450 carry a certification?
SANS Institute Beginner 6y ago
John Hubbard - At the end of the SEC450 course, what do students come away with?
🔐 Cybersecurity
John Hubbard - At the end of the SEC450 course, what do students come away with?
SANS Institute Beginner 6y ago
John Hubbard - What are some of the key tools covered in SEC450?
🔐 Cybersecurity
John Hubbard - What are some of the key tools covered in SEC450?
SANS Institute Beginner 6y ago
John Hubbard - A high level walk through of each day of the SEC450 course
🔐 Cybersecurity
John Hubbard - A high level walk through of each day of the SEC450 course
SANS Institute Beginner 6y ago
John Hubbard - Who exactly was the SEC450 course designed for?
🔐 Cybersecurity
John Hubbard - Who exactly was the SEC450 course designed for?
SANS Institute Beginner 6y ago
John Hubbard – About the SEC450: Blue Team Fundamentals course
🔐 Cybersecurity
John Hubbard – About the SEC450: Blue Team Fundamentals course
SANS Institute Beginner 6y ago
John Hubbard - How long did it actually take you to write the SEC450 course?
🔐 Cybersecurity
John Hubbard - How long did it actually take you to write the SEC450 course?
SANS Institute Beginner 6y ago
John Hubbard - Did you interview other analysts and dial back to your days as an analyst?
🔐 Cybersecurity
John Hubbard - Did you interview other analysts and dial back to your days as an analyst?
SANS Institute Beginner 6y ago
John Hubbard - Why were you the one to create a course for new Blue Teamers?
🔐 Cybersecurity
John Hubbard - Why were you the one to create a course for new Blue Teamers?
SANS Institute Beginner 6y ago
John Hubbard - How did teaching at SANS come about?
🔐 Cybersecurity
John Hubbard - How did teaching at SANS come about?
SANS Institute Beginner 6y ago
John Hubbard - key things that helped him rise from being an analyst to becoming a SOC manager
🔐 Cybersecurity
John Hubbard - key things that helped him rise from being an analyst to becoming a SOC manager
SANS Institute Beginner 6y ago
John Hubbard - some of the early challenges as a young SOC analyst
🔐 Cybersecurity
John Hubbard - some of the early challenges as a young SOC analyst
SANS Institute Beginner 6y ago
John Hubbard - aspirations of becoming an engineer
🔐 Cybersecurity
John Hubbard - aspirations of becoming an engineer
SANS Institute Beginner 6y ago
Introducing John Hubbard
🔐 Cybersecurity
Introducing John Hubbard
SANS Institute Beginner 6y ago
Security Awareness Recognition Program | SANS Security Awareness Summit
🔐 Cybersecurity
Security Awareness Recognition Program | SANS Security Awareness Summit
SANS Institute Intermediate 6y ago
How to Build Your Own Escape Room | SANS Security Awareness Summit
🔐 Cybersecurity
How to Build Your Own Escape Room | SANS Security Awareness Summit
SANS Institute Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction to the Threat Intelligence Lifecycle
📚 Coursera Course ↗
Self-paced
Introduction to the Threat Intelligence Lifecycle
Opens on Coursera ↗
Implementing MPLS VPNs
📚 Coursera Course ↗
Self-paced
Implementing MPLS VPNs
Opens on Coursera ↗
Cyber Security: Applied Cryptography
📚 Coursera Course ↗
Self-paced
Cyber Security: Applied Cryptography
Opens on Coursera ↗
Ethical Hacking
📚 Coursera Course ↗
Self-paced
Ethical Hacking
Opens on Coursera ↗
Threat Hunting Techniques
📚 Coursera Course ↗
Self-paced
Threat Hunting Techniques
Opens on Coursera ↗
Cybersecurity Governance: 16 Steps with NIST & ISO
📚 Coursera Course ↗
Self-paced
Cybersecurity Governance: 16 Steps with NIST & ISO
Opens on Coursera ↗